Babysitter Network Protocol Analysis Skill
Network protocol capture, analysis, and fuzzing capabilities
install
source · Clone the upstream repo
git clone https://github.com/a5c-ai/babysitter
Claude Code · Install into ~/.claude/skills/
T=$(mktemp -d) && git clone --depth=1 https://github.com/a5c-ai/babysitter "$T" && mkdir -p ~/.claude/skills && cp -r "$T/library/specializations/security-research/skills/protocol-analysis" ~/.claude/skills/a5c-ai-babysitter-network-protocol-analysis-skill && rm -rf "$T"
manifest:
library/specializations/security-research/skills/protocol-analysis/SKILL.mdsource content
Network Protocol Analysis Skill
Overview
This skill provides network protocol capture, analysis, and fuzzing capabilities for security research.
Capabilities
- Capture and analyze pcap files
- Write Wireshark dissectors (Lua)
- Create Scapy packet crafting scripts
- Execute network fuzzing with boofuzz
- Parse protocol state machines
- Generate protocol documentation
- Support TLS/SSL analysis
- Create network-based exploits
Target Processes
- protocol-reverse-engineering.js
- network-penetration-testing.js
- malware-analysis.js
- firmware-analysis.js
Dependencies
- Wireshark/tshark
- Scapy (Python)
- boofuzz
- tcpdump
- nmap
- Python 3.x
Usage Context
This skill is essential for:
- Protocol reverse engineering
- Network vulnerability research
- C2 protocol analysis
- Custom protocol fuzzing
- Network-based exploit development
Integration Notes
- Supports live capture and offline analysis
- Can generate reproducible packet sequences
- Integrates with protocol documentation tools
- Supports encrypted traffic analysis (with keys)
- Can create custom Wireshark dissectors